[Owasp-manila] Encoding malicious PDFs as XDP files to bypass anti-virus? No need to panic | Naked Security

Owasp michael.dungog at owasp.org
Mon Jun 25 07:25:19 UTC 2012


Do you want to demonstrate that on our next meeting?


Regards,

Michael Dungog
Chapter Leader, OWASP-Manila


On Jun 25, 2012, at 12:26 PM, Aureson Banaria <tom at secanalyst.org> wrote:

> Will try it using my own crafted infected pdf file...
> 
> 
> 
> On Sun, Jun 24, 2012 at 7:14 PM, Owasp-Manila <michael.dungog at owasp.org> wrote:
> GovCertUK, the UK Government's Computer Emergency Response Team, issued an alert yesterday about how attackers could bypass gateway anti-virus software to infect organisations, by encoding malicious PDF files into the XDP format.
> 
> 
> http://nakedsecurity.sophos.com/2012/06/22/encoding-malicious-pdfs-as-xdp-files-to-bypass-anti-virus-no-need-to-panic/
> 
> Sent from Feeddler RSS Reader
> 
> 
> _______________________________________________
> Owasp-manila mailing list
> Owasp-manila at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-manila
> 
> 
> 
> 
> -- 
> Aureson B. Banaria
> Security Analyst | Opensource advocate
> Security Operations Center
> PerimeterUSA e-security Manila HQ
> 
> email at aureson_01@yahoo.com.ph, / abanaria at perimeterusa.com
> 4/F SM CyberOne, 69 Jupiter St. Buendia Makati City Philippines
> Mobile# 0922.590.1921
> 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-manila/attachments/20120625/c8da8e99/attachment.html>


More information about the Owasp-manila mailing list